8
Siemplify Demo Information and Script Key Business Efficiency Improvement Time Saving: Workload reduction, automation of processes Empowering the Analysts: Noise reduction and focus on real threats, complete workbench Consistency: Orchestration of technical and human processes via playbooks SOC Management: A central workbench for the manager and the SOC team S.A Onboarding: Reduce time of training for new S.A, reduce the level of knowledge required from new S.A Key Competitive Differentiators Visual Contextual Analysis - Alerts, timeline, insights, explorer, and playbooks Our view on what is automation (grouping auto, prioritization auto, auditing auto, playbooks auto) Our view on processes (we go process first - make sure it works and then automate) Very clean and intuitive GUI that our customers praise us for! Very flexible and easy to use - both engineers and analysts can use it for alert response.

Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

Siemplify Demo Information and Script

Key Business Efficiency Improvement

▪ Time Saving: Workload reduction, automation of processes ▪ Empowering the Analysts: Noise reduction and focus on real threats, complete workbench ▪ Consistency: Orchestration of technical and human processes via playbooks ▪ SOC Management: A central workbench for the manager and the SOC team ▪ S.A Onboarding: Reduce time of training for new S.A, reduce the level of knowledge required

from new S.A

Key Competitive Differentiators

▪ Visual Contextual Analysis - Alerts, timeline, insights, explorer, and playbooks ▪ Our view on what is automation (grouping auto, prioritization auto, auditing auto, playbooks

auto) ▪ Our view on processes (we go process first - make sure it works and then automate) ▪ Very clean and intuitive GUI that our customers praise us for! ▪ Very flexible and easy to use - both engineers and analysts can use it for alert response.

Page 2: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

Demo Script

▪ SalesForce\HubSpot Analogy Siemplify provides a central platform for the SOC. A platform where you orchestrate your security tools and the people who work in the SOC with processes that you can measure and improve. Just like sales team have SalesForce and marketing teams have HubSpot or Marketo, security teams use Siemplify.

▪ Siemplify Cases

So, to understand how Siemplify works, let me first explain how data is ingested into Siemplify. As part of the Siemplify platform, there are components that we call connectors. A connector is an application that fetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK), various detection tools, monitored email boxes and more. Multiple connectors can be created in Siemplify to pull alerts from a variety of sources simultaneously, all consolidated in one queue (show queue Reference Table 2) presented in one language to the analysts regardless of the source product. As alerts are pulled into Siemplifty they are wrapped in cases and placed into the queue that can be prioritized and filtered for different tiers and teams.

Table 1: Siemplify Cases

Table 2: Case Queue

Page 3: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

Reference Table 3 for this part of the demo Table 3: Case Overview

▪ Explain Cases Table 4: Entities Each case is like a ticket. It can be closed/opened, assigned, escalated and much more. [click case with one alert] As an alert is pulled into Siemplify it will look like this [point to case] this gives you the information needed for your analysts to make a decision on what to do next. Siemplify doesn’t just take the alerts from the SIEM and turn them into cases with one alert we also look at the information in the cases and we group cases into one cases giving you the complete view of the threat not just a single alert [click case with multiple alerts]. Within the case you are also able to see what is happening [point to alerts in the case] when it happened [point to timeline] and who was involved in the alert [point to entities: reference table 4]. The entities are not just a string of characters it is an object of information [click hash entity].

Page 4: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

▪ Entity Benefit

When the hash entity is clicked Reference Table 6, I can see the historical details about the entity. You can see previous cases that this entity has been involved [point to last cases section] as well as analysis that may have been entered before. This allows me to be able to work more efficiently because I can re-use the analysis that was done in the past. The more the analysis use the system and store information the more powerful it becomes. An analysis can also use the contextual details that have been gathered from enrichment sources like VirusTotal, XForce, ThreatConnect or ActiveDirectoy and others to make decisions. [Use ‘Case Screen” bottom right hand corner. Scroll to bottom of entity details - show information from a enrichment source] Table 5: Entity Details

Page 5: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

▪ Insights

[click back to cases - select C2 case] I talked about how you can see what's happening, when it happened, who was involved. You are also able to see key information about the cases so the analyst can make faster decisions and we show this to you as an insight. Within each of the cases in order to understand what is happening with in the case you need to click through several screens to get to the right information. Siemplify believes in getting analysts the information faster, insights are used to provide the details of the information that was needed to understand what was going on within the case. We bring those to the forefront so that the analysts can get to the answer faster and be able to decide on what to do next without having to click through several screens. [point to insights] Table 6: Insights

▪ Explorer In order to better understand the case, the explorer button allows you to preset the case in a graphical representation so that you can more easily understand what is going on. This also allows your tier 2 tier 3 analysts to come in and start to take action manually on things that Siemplify has found to be malicious. Table 7: Explorer

Page 6: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

▪ Case Wall (Optional)

Also, everything that has been done within a case is automatically documented within the case wall. This is like a chain-of-custody of everything that has been done within a case. Everything from case creation to case closure is documented and can be reported on. Table 8: Case Wall

▪ Playbooks When looking at automation it is important to first start with a process that has been well defined and then start to add automated steps. Building a playbook is very simple to do we provide a drag and drop designed that allows easy modification and create of playbooks. Table 9: Playbook Designer

Page 7: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

▪ Dashboards

We take the data that we are collecting and give you the ability to measure key KPIs. Everything we are collecting can be filtered and measured with the Dashboards allowing high-level management to get a good glimpse into how the SOC is performing. Siemplify also provides the data to giving you the ability to drill down the incidents and measure efficiency. Table 10: Dashboard

Page 8: Siemplify Demo Information and Scriptfetches alerts from data sources - SIEM products (ArcSight, QRadar, McAfee, AlienVault and several others), log repositories (like Splunk or ELK),

Optional

▪ Click Homepage We want analysts have a good view into what they have to do for the data so we provide them a screen that they can go to in order to respond to tasks and see the cases that have been assigned to them. Table 11: Homepage